Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 7 Sep 2012 20:12:04 +0200
From: Lukas Odzioba <>
Subject: Re: Cracking Mountain Lion hashes (WIP)

2012/9/7 Dhiru Kholia <>:
> On Fri, Sep 7, 2012 at 10:59 PM, Alexander Cherepanov <> wrote:
>> On 07.09.2012 20:28, Dhiru Kholia wrote:
>>> Now we need to parse the output of program and figure out
>>> what the output means i.e. what is the iteration count, what is salt
>>> etc.
>> Well, ShadowHashData field is also plist. Convert it with the same
>> script and you get 'salt', 'entropy' and 'iterations'.
> Thanks!, that worked.
> Next question, where is the actual pbkdf2 hash? I don't see it.
Can you post it?

If it is pure sha512pbkdf2 it should be consistent with this:

from passlib.hash import grub_pbkdf2_sha512
hash = grub_pbkdf2_sha512.encrypt("password", rounds=10964, salt="salt")
print hash

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.